### [CVE-2019-3402](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3402) ![](https://img.shields.io/static/v1?label=Product&message=Jira&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.13.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross%20Site%20Scripting%20(XSS)&color=brighgreen) ### Description The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/Faizee-Asad/JIRA-Vulnerabilities - https://github.com/UGF0aWVudF9aZXJv/Atlassian-Jira-pentesting - https://github.com/imhunterand/JiraCVE - https://github.com/merlinepedra/nuclei-templates - https://github.com/merlinepedra25/nuclei-templates - https://github.com/pen4uin/awesome-vulnerability-research - https://github.com/pen4uin/vulnerability-research - https://github.com/pen4uin/vulnerability-research-list - https://github.com/rezasarvani/JiraVulChecker - https://github.com/sobinge/nuclei-templates - https://github.com/sushantdhopat/JIRA_testing